%% You should probably cite draft-ietf-perc-double instead of this I-D. @techreport{jennings-perc-double-01, number = {draft-jennings-perc-double-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-jennings-perc-double/01/}, author = {Cullen Fluffy Jennings and Paul Jones and Adam Roach}, title = {{SRTP Double Encryption Procedures}}, pagetotal = 13, year = 2016, month = mar, day = 21, abstract = {In some conferencing scenarios, it is desirable for an intermediary to be able to manipulate some RTP parameters, while still providing strong end-to-end security guarantees. This document defines SRTP procedures that use two separate but related cryptographic contexts to provide "hop-by-hop" and "end-to-end" security guarantees. Both the end-to-end and hop-by-hop cryptographic transforms can utilize an authenticated encryption with associated data scheme or take advantage of future SRTP transforms with different properties.}, }